{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:24:10Z","timestamp":1757312650267},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504988"},{"type":"electronic","value":"9783319505008"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50500-8_7","type":"book-chapter","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T11:14:46Z","timestamp":1495106086000},"page":"173-191","source":"Crossref","is-referenced-by-count":17,"title":["Introduction to the TPM"],"prefix":"10.1007","author":[{"given":"Allan","family":"Tomlinson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"key":"7_CR1","unstructured":"Dept. of Defense, \u201cDoD 5200.28-STD: Department of defense trusted computer system evaluation criteria\u201d, tech. rep., Department of Defense, 1985."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"C. Mitchell, ed., Trusted Computing. London, UK: IEE Press, 2005.","DOI":"10.1049\/PBPC006E"},{"key":"7_CR3","unstructured":"E. Gallery and C. J. Mitchell, \u201cTrusted mobile platforms\u201d, in FOSAD \u201907, International School on Foundations of Security Analysis and Design, vol. 4677 of LNCS, (Bertinoro, Italy), Springer-Verlag, Sep 2007."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"S. W. Smith, Trusted Computing Platforms: Design and Applications. Springer-Verlag, 2005.","DOI":"10.1007\/978-3-662-41015-8"},{"key":"7_CR5","unstructured":"TCG, \u201cTCG Specification Architecture Overview\u201d, TCG Specification Revision 1.4, The Trusted Computing Group, Portland, OR, USA, Aug 2007."},{"key":"7_CR6","unstructured":"S. Pearson, \u201cTrusted computing platforms, the next security solution\u201d, Technical Report HPL-2002-221, Hewlett-Packard Laboratories, Nov 2002."},{"key":"7_CR7","unstructured":"B. Balacheff, L. Chen, S. Pearson, D. Plaquin, and G. Proudler, Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall, 2003."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"R. Anderson, \u201cCryptography and competition policy: issues with \u2018trusted computing\u2019 \u201d, in PODC \u201903: Proceedings of the twenty-second annual symposium on Principles of distributed computing, (New York, NY, USA), pp. 3V10, ACM Press, 2003.","DOI":"10.1145\/872035.872036"},{"key":"7_CR9","unstructured":"R. J. Anderson, Security Engineering - a Guide to Building Dependable Distributed Systems. Wiley, 2001."},{"key":"7_CR10","unstructured":"TCG, \u201cTPM Main, Part 1 Design Principles\u201d, TCG Specification Version 1.2 Revision 116, The Trusted Computing Group, Portland, OR, USA, March 2011."},{"key":"7_CR11","unstructured":"S. Pearson. (ed.): \u201cTrusted Computing Platforms: TCPA Technology in Context\u201d, Prentice Hall, 2003."},{"key":"7_CR12","unstructured":"TCG, \u201cTPM Main, Part 2 TPM Structures\u201d, TCG Specification Version 1.2 Revision 116, The Trusted Computing Group, Portland, OR, USA, March 2011."},{"key":"7_CR13","unstructured":"TCG, \u201cTPM Main, Part 3 Commands\u201d, TCG Specification Version 1.2 Revision 116, The Trusted Computing Group, Portland, OR, USA, March 2011."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"E. Gallery, \u201cAn overview of trusted computing technology\u201d, in Trusted Computing (C. J. Mitchell, ed.), IEE, 2005.","DOI":"10.1049\/PBPC006E_ch3"},{"key":"7_CR15","unstructured":"S. Kinney, Trusted Platform Module Basics: Using TPM in Embedded Systems. Elsevier, 2006."},{"key":"7_CR16","unstructured":"FIPS, \u201cSpecifications for the Secure Hash Standard\u201d, Tech. Rep. 180-2, Federal Information Processing Standards, National Technical Information Service (NTIS), 5285 Port Royal Road, Springfield, VA 22161, Aug 2002."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. Bellare, and R. Canetti, \u201cHMAC: Keyed-hashing for message authentication\u201d, RFC 2104, IETF, 1997.","DOI":"10.17487\/rfc2104"},{"key":"7_CR18","unstructured":"M. Bellare, R. Canetti, and H. Krawczyk, \u201cKeying Hash Functions for Message Authentication\u201d, in Advances in Cryptology - Crypto \u201996 (N. Koblitz, ed.), vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, 1996."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, A. Shamir, and L. M. Adelman, \u201cA method for obtaining digital signatures and public-key cryptosystems\u201d, Communications of the ACM, vol. 21, pp. 120V126, 1978.","DOI":"10.1145\/359340.359342"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"X. Wang, L. Y. Yiqun, and H. Yu, \u201cFinding collisions in the full SHA-1.\u201d Annual International Cryptology Conference, Springer Berlin Heidelberg, 2005.","DOI":"10.1007\/11535218_2"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"W. Arthur and D. Challener, A Practical Guide to TPM 2.0 ApressOpen, 2015.","DOI":"10.1007\/978-1-4302-6584-9"},{"key":"7_CR22","unstructured":"TCG, \u201cTrusted Platform Module Library, Part 1: Architecture\u201d, TCG Specification Version 2.0 Revision 00.99, The Trusted Computing Group, Portland, OR, USA, October 2013."},{"key":"7_CR23","unstructured":"TCG, \u201cTrusted Platform Module Library, Part 2: Structures\u201d, TCG Specification Version 2.0 Revision 01.16, The Trusted Computing Group, Portland, OR, USA, October 2014."},{"key":"7_CR24","unstructured":"TCG, \u201cTrusted Platform Module Library, Part 3: Commands\u201d, TCG Specification Version 2.0 Revision 01.16, The Trusted Computing Group, Portland, OR, USA, October 2014."},{"key":"7_CR25","unstructured":"TCG, \u201cTrusted Platform Module Library, Part 4: Supporting Routines\u201d, TCG Specification Version 2.0 Revision 01.16, The Trusted Computing Group, Portland, OR, USA, October 2014."}],"container-title":["Smart Cards, Tokens, Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50500-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T20:16:51Z","timestamp":1569356211000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50500-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319504988","9783319505008"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50500-8_7","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}